Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Conflict Resolution Strategy in Handover Management for 4G and 5G Networks

    Abdulraqeb Alhammadi1,*, Wan Haslina Hassan1, Ayman A. El-Saleh2, Ibraheem Shayea3, Hafizal Mohamad4, Yousef Ibrahim Daradkeh5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5215-5232, 2022, DOI:10.32604/cmc.2022.024713

    Abstract Fifth-generation (5G) cellular networks offer high transmission rates in dense urban environments. However, a massive deployment of small cells will be required to provide wide-area coverage, which leads to an increase in the number of handovers (HOs). Mobility management is an important issue that requires considerable attention in heterogeneous networks, where 5G ultra-dense small cells coexist with current fourth-generation (4G) networks. Although mobility robustness optimization (MRO) and load balancing optimization (LBO) functions have been introduced in the 3GPP standard to address HO problems, non-robust and nonoptimal algorithms for selecting appropriate HO control parameters (HCPs) still exist, and an optimal solution… More >

  • Open Access

    ARTICLE

    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was considered as a utility function… More >

  • Open Access

    ARTICLE

    HARQ Optimization for PDCP Duplication-Based 5G URLLC Dual Connectivity

    Changsung Lee1,3, Junsung Kim2,3, Jaewook Jung3, Jungsuk Baik3, Jong-Moon Chung3,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 727-738, 2022, DOI:10.32604/cmc.2022.024824

    Abstract Packet duplication (PD) with dual connectivity (DC) was newly introduced in the 5G New Radio (NR) specifications to meet the stringent ultra reliable low latency communication (URLLC) requirements. PD technology uses duplicated packets in the packet data convergence protocol (PDCP) layer that are transmitted via two different access nodes (ANs) to the user equipment (UE) in order to enhance the reliability performance. However, PD can result in unnecessary retransmissions in the lower layers since the hybrid automatic retransmission request (HARQ) operation is unaware of the transmission success achieved through the alternate DC link to the UE. To overcome this issue,… More >

  • Open Access

    ARTICLE

    Feature Selection Based on IoT Aware QDA Node Authentication in 5G Networks

    M. P. Haripriya*, P. Venkadesh

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 825-836, 2022, DOI:10.32604/iasc.2022.022940

    Abstract The coming generation in mobile networks is the fifth generation (5G), which appears to be the promoter of the upcoming digital world. 5G is defined by a single piece of cellular access technology or a combination of advanced access technologies. Rather, 5G is a true network assembler that provides consistent support for a slew of novel network topologies. Prior generations provide as a suitable starting point and give support for the security architecture for 5G security. Through authentication and cryptography techniques, many works have tackled the security issues in 3G and 4G networks in an effective manner. However, security of… More >

  • Open Access

    ARTICLE

    Improved Radio Resource Allocation in 5G Network Using Fuzzy Logic Systems

    S. Vimalnath1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1687-1699, 2022, DOI:10.32604/iasc.2022.023083

    Abstract With recent advancements in machine-to-machine (M2M), the demand for fastest communication is an utmost concern of the M2M technology. The advent of 5G telecommunication networks enables to bridge the demand on satisfying the Quality-of-Service (QoS) concerns in M2M communication. The massive number of devices in M2M communication is henceforth do not lie under limited resource allocation by embedding the 5G telecommunication network. In this paper, we address the above limitation of allocation the resource to prominent M2M devices using Adaptive Neuro Fuzzy Inference System (ANFIS). In ANFIS, the adoption of rules will imply the resource allocation with the devices of… More >

  • Open Access

    ARTICLE

    Greedy-Genetic Algorithm Based Video Data Scheduling Over 5G Networks

    E. Elamaran1,*, B. Sudhakar2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1467-1477, 2022, DOI:10.32604/iasc.2022.020625

    Abstract Essential components in wireless systems are schedulin and resource allocation. The problems in scheduling refers to inactive users in a given time slot and in terms of resource allocation it refers to the issues in the allocation of physical layer resources such as power and bandwidth among the active users. In the Long Time Evolution (LTE) downlink scheduling the optimized problem refers to the flow deadlines that incorporate the formulation in the surveyed scheduling algorithm for achieving enhanced performance levels. The major challenges appear in the areas of quality and bandwidth constrains in the video processing sectors in 5G. The… More >

  • Open Access

    ARTICLE

    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840

    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks

    Fahd N. Al-Wesabi1,2,*, Imran Khan3, Saleem Latteef Mohammed4, Huda Farooq Jameel4, Mohammad Alamgeer5, Ali M. Al-Sharafi6, Byung Seo Kim7

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1-15, 2022, DOI:10.32604/cmc.2022.018469

    Abstract With the rapid development of the next-generation mobile network, the number of terminal devices and applications is growing explosively. Therefore, how to obtain a higher data rate, wider network coverage and higher resource utilization in the limited spectrum resources has become the common research goal of scholars. Device-to-Device (D2D) communication technology and other frontier communication technologies have emerged. Device-to-Device communication technology is the technology that devices in proximity can communicate directly in cellular networks. It has become one of the key technologies of the fifth-generation mobile communications system(5G). D2D communication technology which is introduced into cellular networks can effectively improve… More >

  • Open Access

    ARTICLE

    An Intent-Driven Closed-Loop Platform for 5G Network Service Orchestration

    Talha Ahmed Khan, Khizar Abbas, Afaq Muhammad, Wang-Cheol Song*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4323-4340, 2022, DOI:10.32604/cmc.2022.017118

    Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible to provide seamless service provisioning… More >

  • Open Access

    ARTICLE

    Cyber-Attack Detection and Mitigation Using SVM for 5G Network

    Sulaiman Yousef Alshunaifi, Shailendra Mishra*, Mohammed Alshehri

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 13-28, 2022, DOI:10.32604/iasc.2022.019121

    Abstract 5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G(LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data… More >

Displaying 11-20 on page 2 of 23. Per Page